A hacker who intends to attack an organization would be looking for a single point of entrance, to get started. Anyone in the organization would suffice as the initial target. In this phase, it’s mostly phishing emails that hackers use to lure the vulnerable initial target into letting in a malware into the organizational network.

Now the most challenging part is that the companies that got affected by cyber attacks are working to regain the trust of their customers. Companies are show cased technology to customers and telling them the cyber security has improved.